Preferred Language
Articles
/
jcopolicy-466
nternational will in the Security Council Towards the Syrian crisis
...Show More Authors

Nations witnessed since its existence a state of wills conflict as a result of the intersection and intertwining of interests, through which it sought to achieve its goals and objectives, and this has often led to direct military conflicts and countless wars, and witnessed the entry into global wars in which humanity lost millions of lives and losses .Despite the great changes in the international arena, especially in recent decades, the conflict of wills has not ceased, although some of its features and forms have changed, and it has become more complicated after the withdrawal of this conflict to international organizations and bodies, including the Security Council. It is mandated under the Charter of the United Nations to work for achieving international peace and security through the consensus of the permanent states and the issuance of effective resolutions to resolve the problems and issues before it, as the features of the conflict of wills between the member states in the discussions of the Syrian crisis have clearly emerged, which hindered the Council's ability to address them and caused them to continue for several years .It was reflected on more losses and even greater complexity of the situation.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 01 2025
Journal Name
مجلة العلوم و التكنولوجية للنشاطات البدنية و الرياضية
Attitudes of students of the College of Physical Education and Sports Sciences towards modern educational strategies used in scientific courses from the perspective of fourth-year students.
...Show More Authors

The aim of the research: To identify the trends of students of the College of Physical Education and Sports Sciences towards modern teaching methods. To determine the type of strategies used that students prefer in practical lessons. In light of the research results, the researcher adopted the descriptive method because it is appropriate for the study. The research community is represented by students of the College of Physical Education and Sports Sciences (fourth stage), amounting to (320) students. Conclusions: The research results indicate that students of the College of Physical Education and Sports Sciences have positive and strong attitudes towards using modern teaching methods, and they realize their reality in improving interaction

... Show More
View Publication
Publication Date
Mon Dec 01 2025
Journal Name
المجلة العلمية لعلوم والتكنولوجية للنشاطات البدنية والرياضية
Attitudes of students of the College of Physical Education and Sports Sciences towards modern educational strategies used in scientific courses from the perspective of fourth-year students
...Show More Authors

The aim of the research: To identify the trends of students of the College of Physical Education and Sports Sciences towards modern teaching methods. To determine the type of strategies used that students prefer in practical lessons. In light of the research results, the researcher adopted the descriptive method because it is appropriate for the study. The research community is represented by students of the College of Physical Education and Sports Sciences (fourth stage), amounting to (320) students. Conclusions: The research results indicate that students of the College of Physical Education and Sports Sciences have positive and strong attitudes towards using modern teaching methods, and they realize their reality in improving interaction

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 23 2022
Journal Name
Journal Of Educational And Psychological Researches
The perceptive image of volunteering and its relationship to the motives towards volunteering among a sample of Al-Quds Open University students.
...Show More Authors

This study aimed to identify the perceived mental image of volunteering, and its relationship to volunteer motivation among a sample of Al-Quds Open University students, as well as to identify the differences in the perceived mental image of volunteering due to variables (gender, year of study, place of residence, college). The researcher has used relational descriptive approach. The researcher has used two questionnaires, the first was used to measure the perceptive mental image of volunteering, and the second to measure the motivation towards volunteering, and the study population may consist of all students of Al-Quds Open University Hebron Branch during the first semester of the academic year 2021/2020 and their number (3462)Male and

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Electronics
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
...Show More Authors

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex

... Show More
View Publication
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Aug 07 2019
Journal Name
Iraqi National Journal Of Nursing Specialties
Nurses' Knowledge toward Care of Unconscious Adult Patients at Teaching Hospitals in Al-Hilla City
...Show More Authors

Objective: The study aims to evaluate nurses' knowledge toward care of unconscious adult patients and identify the relationship between nurses’ knowledge toward care of unconscious adult patient and their demographic characteristics of age, gender, Marital Status, level of qualification and years of experience. Methodology: A descriptive study (quantitative design) was carried out by using quasi experimental design to study nurses' knowledge, attitudes and practices toward care of unconscious adult patients at teaching hospitals in Al-Hilla City from September 2018 up to June 2019. A purposively sample has been chosen in which included 60 nurses who work in ICUs within two hospitals (Imam Al-Sadiq teaching hospital and Al-Hilla general

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 06 2022
Journal Name
Iraqi National Journal Of Nursing Specialties
Nurses’ Knowledge and Practices concerning Physiotherapy Protocol at Intensive Care Units in AL-Nasiriyah City
...Show More Authors

Abstract:

Objective (s): This study aims to assess nurses' knowledge and practice regarding physiotherapy protocol at intensive care units

Methodology: descriptive cross-sectional study design executed at the ICU in the city hospitals of AL- for the time of 13th October/ 2021 to 7th April /2022. Questionnaire filled by 75 nurses who work in ICU who had chosen by non-probability (purposive) selection collected the data. Then the researcher used an observational checklist to evaluate nurses’ practice. The data was analyzed using descriptive statistics and SPSS.

Results: the study found a deficit in nurses’ knowledge and pra

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Towards Perceptions building a descriptive and procedural for the knowledge assets at the center of learning and growth for the techniques of Balanced Score card in the light of the strategic map concepts to achieve the strategic and operational: requirements of the contemporary business
...Show More Authors

Abstract:

   Witness the current business environment changes rapidly reflected on the performance of the facility wishing to stay , which is no longer style reaction enough to handle installations with their environment , and quickly began to lose its luster with the emergence of a message and the vision of contemporary business environment from a set of parts interacting with each other and the concept of behavioral includes all dimensions of performance, it is imperative to adopt a system installations influence variables and positive interaction through the development of strategic plans and the use of implementation and follow-up strategies to ensure the effectiveness of the method for meas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Physics: Conference Series
Statistical Evalution of Safety Procedures and Chemical Security in Chemical Laboratories / College Ibn Al Haitham
...Show More Authors
Abstract<p>In order to minimize the significant incidents in chemical laboratories, specially the academic laboratories, one must be able to identify and evaluate hazards. Familiar with safety rules and responsibilities. Assessing implementation of safety rules and securities. The aim of this paper is to for the evaluate and assess the of chemical safety procedures and chemical policies in academic laboratories using statistical questionnaire. A form is written, suggested two main parts, safety and security. Safety part includes three classes, hardware requirements, training and application of safety procedures. the second part is security. The form design is based on four points Likert scale. T</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref